E Commerce Set 7
On This Page
This set of E-Commerce Multiple Choice Questions & Answers (MCQs) focuses on E Commerce Set 7
Q1 | E-mail which contains useless material is termed as……………
- spam
- useless mail
- trunk mail
- junk mail
Q2 | India has enacted the first IT Act in the year……………………
- 2001
- 2002
- 2009
- 2000
Q3 | Which of the following crimes were not covered under IT (Amendment) Act, 2008 ?
- cyber terrorism
- child pornography
- video voyeurism
- none of these
Q4 | Trade mark, copyright, patent law etc comes under the purview of……………………
- data protection
- telecommunication laws
- intellectual property laws
- none
Q5 | Which one of the following is not a principle of e-commerce ?
- privacy
- integrity
- authentication
- none of these
Q6 | ………………is basically a secure gate between our organization data and internet.
- network firewall
- antivirus
- both of these
- none of these
Q7 | ………………is automated methods of recognizing a person based on a physiological orbehavioral characteristic.
- biometrics
- pin
- both of these
- none of these
Q8 | ……………….is a financial institution that establishes an account with a merchant andprocesses payment card authorization and payments.
- customer
- issuer
- merchant
- acquirer
Q9 | In …………………..type of payment system customer is allowed to spend only up to theamount that have pre deposited into account.
- prepaid
- post paid
- both of these
- none of these
Q10 | .……………….is the exchange of goods or items or commodities and services orapplications used for money and deals the money matters
- e-commerce
- commerce
- both of these
- none
Q11 | ……………….always operate on intranet
- e--commerce
- e-business
- edi
- none of these
Q12 | Which among the following is not an example for E-commerce
- amazon.com
- baazar.com
- e-trade.com
- none of these
Q13 | ………………were the first to establish prominent E-commerce Brands
- baazar.com
- e-bay and amazon
- e-trade.com
- none of these
Q14 | …………….is a form of supply chain where a series of assembly operations are carriedout to obtain the final product
- converging supply chain
- diverging supply chain
- any of these
- none
Q15 | .…………………is a form of supply chain where a wide variety of finished goods areproduced with limited number of raw material or components.
- converging structure
- diverging structure
- any of these
- none
Q16 | ……………………is the exchange of services, information or product from onebusiness to a government agency
- b2g
- b2e
- b2b
- p2p
Q17 | ………………….is an internet network that allows users with the same network insoftware to connect to each other’s hard disks and exchange files
- b2c
- b2e
- b2b
- p2p
Q18 | ”Google” is one of the most popular………………..
- portal
- browser
- search engine
- none of these
Q19 | A ………………….. Presents information from diverse sources in a unified way in aweb site.
- web portal
- link page
- both of these
- none of these
Q20 | ……………………….is a person who breaks in or trespasses a computer system
- hacker
- snooper
- operator
- spoofer
Q21 | Peer to Peer [P2P] is also used to describe ………………………
- c2c
- b2e
- b2b
- b2c
Q22 | ……………..allows the person to type ion just the main word or words and the site willcome in
- web page
- home page
- domain
- none of these
Q23 | A ………………….. presents information from diverse sources in a unified way in aweb site
- web portal
- link page
- both of these
- none of these
Q24 | In Biometrics,…………………………ID system is designed to prevent one personfrom using more than one identity
- positive id system
- negative id system
- both of these
- none of these
Q25 | …………………..are program developed by some dishonest people to destroy thecomputer system and the valuable information in it.
- network firewall
- computer virus
- both of these
- none of these